Blog

Purchasing a new computer can be a daunting task, especially if you’re not familiar with its components. You’ll want to make sure you make the right choice so you don’t end up buying one that becomes obsolete within just a few months. How much money should you spend? Which model is the best for you? […]

As a business owner, you may think social media isn’t worth the effort. You may have dabbled in Twitter, Facebook, or LinkedIn and seen minimal (if any) results. Of course there are other businesses that do well on these platforms – like Nike or Google – you may think. But these are exciting brands! What […]

For nearly two months now, Apple’s iOS 9 has been available for upgrade. But if you have yet to make the switch, you may still be curious about its new features and whether or not they make it worth installing. If this is you, here’s what you need to know about iOS 9 and four […]

Mac users who have been using Office 2011 now have a reason to smile: Microsoft finally released the latest Office 2016 for Mac in September. Office 2016 is packed with powerful new features for Microsoft’s core applications, including Word, PowerPoint, Excel, and Outlook, all of which are designed to run and perform seamlessly on the […]

There is nothing worse for a company and its customers than being forced to close because of inclement weather. And with winter almost upon us once again, now is a good time to make sure your business continuity plan is prepared for anything and everything mother nature is looking to throw your way. By communicating […]

Adobe recently released a patch to fix a zero-day vulnerability within its Flash Player Software and, as of last week, Oracle had released an update to cover more than two-dozen flaws in its Java software. Both of these programs work directly with a user’s browser and are often targeted by malicious software.

MAHWAH, New Jersey (June 17, 2015) – Infoaxis announced today it has achieved Select Certification from Cisco. The Select Certification recognizes Cisco® channel partners that focus on meeting the technology and services needs of small businesses.

According to Forbes, in the realm of cyber security and supply chain management, most security breaches occur from within an organization. In addition to being the result of a lack in the correct technology-based defense, these breaches are a byproduct of poor internal security policy and compliance controls enforced by employers; these oversights can be slight, such as an employee taking a laptop home for the weekend.

Much like boxing, IT security requires training, preparation, and planning; an individual must be primed for an attack despite the fact that the kind of attack or when it will happen is entirely uncertain. Sunguard Availability Services (Sunguard AS), experts in the managed services and IT recovery industry, compares IT security to that of the recent Mayweather vs.